General

  • Target

    3b8f70eaccbdb1cf69ac5b5f1b7c5dc72631ab2e740e76f76e0df998d50ba2cf

  • Size

    4.0MB

  • Sample

    221023-zzghbscfg4

  • MD5

    9db55640696bc0fd1cb08568c42f5d5b

  • SHA1

    89f1105462ee2003bcc44a70d9ddd00d21bb5938

  • SHA256

    3b8f70eaccbdb1cf69ac5b5f1b7c5dc72631ab2e740e76f76e0df998d50ba2cf

  • SHA512

    7a9543e7bbb8d26fb35450580e7dac37cd410bc273214421a62465456365cb8ce3e780b88938927e9d3deb3f13de11b7310ea3f6424b17a41c4cf612358fd812

  • SSDEEP

    98304:FPUpwKFQhvFGd6toOUVuwXWxiTsFtJ3L1ifCGW:FPwT2FGGAVLXAT3RifCGW

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Targets

    • Target

      3b8f70eaccbdb1cf69ac5b5f1b7c5dc72631ab2e740e76f76e0df998d50ba2cf

    • Size

      4.0MB

    • MD5

      9db55640696bc0fd1cb08568c42f5d5b

    • SHA1

      89f1105462ee2003bcc44a70d9ddd00d21bb5938

    • SHA256

      3b8f70eaccbdb1cf69ac5b5f1b7c5dc72631ab2e740e76f76e0df998d50ba2cf

    • SHA512

      7a9543e7bbb8d26fb35450580e7dac37cd410bc273214421a62465456365cb8ce3e780b88938927e9d3deb3f13de11b7310ea3f6424b17a41c4cf612358fd812

    • SSDEEP

      98304:FPUpwKFQhvFGd6toOUVuwXWxiTsFtJ3L1ifCGW:FPwT2FGGAVLXAT3RifCGW

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks